MDM Technology: How to Create the Perfect Solution Sponsored by:

Transcription

MDM Technology: How to Create the Perfect Solution Sponsored by:
MDM Technology:
How to Create the
Perfect Solution
Sponsored by:
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
Contents
Introduction ................................................................................................................. 3
Unavoidable: 62 percent of companies to allow BYOD by year’s end ........................... 4
Four stages to conquer mobile content management .................................................. 7
Research: 41 percent increasing IT security budget in 2014 ...................................... 10
PwC: Software at the forefront of tech M&A activity in 2014 ...................................... 13
7 things to think about with enterprise mobile service architecture ............................. 14
Five Takeaways ......................................................................................................... 16
About Skyhook and ZDNet......................................................................................... 17
This document is comprised of CBS Interactive editorial material and has been written and compiled by CBSi editors and
affiliates. While Skyhook may have had input on the topic and title of the guide and is the exclusive sponsor, CBSi has
maintained editorial control of the content in this guide.
Copyright ©2014 CBS Interactive Inc. All rights reserved.
2
MDM Technology: How to Create the Perfect Solution
Introduction
By the end of 2014, 62% of organizations will institute Bring Your Own Device policies. This means
a constantly mobile, constantly connected workforce will be armed with crucial business data at all
times. The ability to manage and protect the devices carrying this data will be a critical aspect of any IT
department’s operations. Fortunately, there are technology companies that are simplifying and securing the
management of mobile devices.
Mobile Device Management (MDM) services and technology
providers must understand the needs, risks and day-today processes of the organizations they serve. They must
Mobile Device Management
understand how and why devices are being used in order to
(MDM) services and technology
provide seamless and secure technology. This can be a tricky
providers must understand the
process, especially as mobile needs change industry-wide,
and as the mobile workforce increases in size.
If your organization is looking for more information on building
out your MDM technology, this Tech Roundup is the perfect
needs, risks and day-to-day
processes of the organizations
they serve.
resource for you. Packed with articles from pre-eminent editors
and bloggers on the leading IT media outlets, TechRepublic
and ZDNet, this editorial reference guide provides you
with objective information on MDM technology done right.
In addition to leading editorial, we’ll offer you several key
takeaways to consider as you improve your solution. u
3
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
Unavoidable: 62 percent of companies to
allow BYOD by year’s end
By Teena Hammond
As employees bring their personal smartphones, tablets and laptops to the office, or use them offsite as
they take their work home, IT departments are grappling with the growing Bring Your Own Device (BYOD)
trend.
More than 44 percent of
This change in how people work and the devices
organizations already allow
setting BYOD guidelines to protect company security as
they’re working on is leading to many IT departments
BYOD and another 18 percent
employees access email and other potentially proprietary
plan to move to BYOD by the
to data is controlled and productivity can be extended to
end of 2013.
data on their own devices. By setting guidelines, access
these devices.
Get a head start on launching a BYOD program with TechRepublic’s
ready-made BYOD policy.
To better understand how IT departments are approaching BYOD, we invited TechRepublic and ZDNet
members to take a BYOD Business Strategy Survey. A wide array of responses was received with more
than 1,000 people worldwide participating. The following are just two surprising facts we discovered:
More than 44 percent of organizations already allow BYOD and another 18
percent plan to move to BYOD by the end of 2013.
4
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
BYOD isn’t new for those who allow it, with 61 percent of companies with
policies already in place having those policies for more than a year.
5
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
Respondents also revealed their reasons for not adopting a BYOD policy. Security topped the list, but
there were other, less obvious, motives. For companies with policies in place, our research uncovered the
following:
•
Brand/Type of device most often issued by the company
•
Device brand restrictions
•
Percentage of employees who participate in the program
•
Type of personal devices used most often for work
•
Security approaches
•
Hardware/Service plan costs (i.e. who’s paying)
Whatever position your company takes on BYOD, whether to allow it or not, the information in this report
can help you develop a BYOD plan that serves both the organization and employees. u
6
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
Four stages to conquer mobile content management
By Teena Hammond
Mobile content management (MCM) is becoming more important as a platform for enterprises as mobility
and Bring Your Own Device (BYOD) provide the technology framework for today’s workforce. Naturally, this
means that the market is quickly flooding with MCM solutions from mainstream collaboration tools vendors
and mobile app developers. Even the mobile device management (MDM) players are getting into the act.
I must also note that my recent research into MCM also shows it is converging with mobile collaboration in
both product roadmaps and how enterprise mobile users are interacting with corporate content from their
mobile devices.
I put my analysis of MCM in front of Yaacov Cohen, CEO of harmon.ie, a collaboration tools provider
focusing on Office 365.
Stage 1: Rogue IT or Shadow IT - Free cloud storage phase
The first stage of mobile content management considered by some on the market as Rogue IT (otherwise
known as ShadowIT). This is where mobile users with a little bit of knowledge begin putting corporate
documents into personal cloud storage accounts on Dropbox, Google Drive, Box, or OneDrive (formerly
SkyDrive).
Two reports that can speak more to risks of the Rogue IT stage are:
•
The High Cost of Mobile Business Users’ Rogue IT Practices (PDF) from harmon.ie
•
State of the Enterprise Information Landscape (PDF) from Huddle, a collaboration platform that
challenges SharePoint
While consumer cloud vendors including Dropbox and Box have released two-factor authentication, it
doesn’t mean users are going to implement security measures especially if they are using free storage
without the blessing of corporate management
The security risks inherent with stage 1 mean enterprises don’t want to stay here long. Likewise, the
requisite endpoint security needs to be in place or else elements of stage 1 could remain in place.
7
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
Stage 2: Cloud solutions, mobile device management
and intelligent mobile apps
With Office 365, Huddle, and RedHost taking collaboration to the
cloud, stage 2 means that an enterprise can approach MCM in a
Today’s cloud
more mature manner with user privileges, true file locking, content
collaboration platforms
version control, and intelligent mobile apps from innovative
mean their own class of
platform and third party vendors. Stage 2 is more about control
and collaboration, less about the ad hoc convenient file storage
intelligent mobile apps.
that marks stage 1.
Today’s cloud collaboration platforms mean their own class of
intelligent mobile apps. I’ve written about harmon.ie’s SharePoint client offerings on both iOS and Android.
Colligo is also doing some excellent work with Colligo Briefcase. Huddle’s mobile app includes a patent
pending document recommendation engine and improvements on the mobile app are certain to play into
Huddle’s overall product roadmap.
Traditional MDM vendors including MobileIron, AirWatch, and Good have their own app stores now.
Vendors including harmon.ie have released secure versions of their apps that integrate directly with the
MDM solution.
As MCM gains more intelligence in stage 2, Mobile Identity Management becomes an option as distinct
requirements for device security and cloud access grow for enterprises.
Tom Kemp, CEO of Centrify, a leading identity tools vendor that support mobile and cloud application said,
“First and foremost, ensure the device is secure. Second, you want mobile application management to
deploy the app to the device, then the next thing is what people really want is that people don’t want to
always have to enter their username and password when they access files.”
Stage 3: Cloud, MDM, intelligent mobile apps, and social
The introduction of an enterprise social component to MCM marks stage 3.
“I would say if you are serious about collaboration – your second stage – you need social,” adds Cohen. He
labels it a natural evolution because it takes mobile users beyond the document and fosters brainstorming
You can have social interactions, and say ‘hey, why don’t you update this slide.” You can already look at
that as the third one.
The social component that arrives with stage 3 is especially important as companies turn to mobile first
strategies, geographically dispersed workforces, and contractors to serve their customers.
8
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
Stage 4: Emergence of context and location-based technologies in MCM
“Context or intelligence is the next generation,” says Cohen. “Nobody is really doing it.”
His look into the future of context is the content being brought to the mobile user when they need it. His
example to me was an employee has an important meeting with a manager or executive. A mobile content
management solution pushes the latest documents you have rights to on the collaboration platform and
even recent enterprise social posts from the meeting attendees. He also predicts that the REST API will
play a role in the future phase and query Salesforce and perhaps other backend systems for data pertinent
to the meeting. This data would in turn appear on the mobile devices of authorized meeting attendees.
“Context or intelligence is the
It could even be location-based. Cohen points to where a
next generation,” says Cohen.
information
“Nobody is really doing it.”
mobile device’s location can help drive further contextual
Stage 4 wasn’t in my original article. It’s Cohen’s
suggestion to me and matches other activity I’m seeing
in the market, so I added it to my original three stages. For example, I recently got a briefing from Blake
Brannon, global sales engineering manager for Air Watch about recent updates to the Air Watch Content
Locker. Geographic-base security called Geo-fencing is part of the product enabling enterprises to lock
down corporate content by geographic location. Other vendors are moving in a similar direction. Look for
an upcoming TechRepublic post from me about the AirWatch Content Locker.
Final thoughts
Through changing business rules, technology, or security concerns, the state of mobile content
management is continuously evolving. Enterprises need to manage their mobile content management
requirements from inception through the next generation technology options that stage 4 offers a mobile
workforce. u
9
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
Research: 41 percent increasing IT
security budget in 2014
By Teena Hammond
Security is always a concern for IT professionals, and media news reports of breaches and leaks, combined
with internal threats, have further increased worries.
A recent Tech Pro Research survey focused on IT security. The survey attracted 244 respondents from
around the globe and from organizations of all sizes. The resulting report, IT Security: Concerns, budgets,
trends and plans, focuses on the key findings from the survey.
Budgets were a hot subject. Overall, 41 percent of survey respondents said they will increase their IT
security budget next year. This is a 16 percent increase compared to the number of budgets that rose in
2013. In addition, only 11 percent of all respondents said they plan to decrease their security budget next
year.
About two-thirds of the respondents said they are now more
concerned with security, following media reports of breaches and
41 percent of survey
leaks. However, only large organizations with more than 1,000
respondents said they will
employees are planning to improve IT security controls. Smaller
increase their IT security
companies are lagging behind in the implementation of IT security
budget next year.
controls.
Security projects were also discussed, with the top project for 2014
remaining the same as 2013: the development of better risk management processes.
10
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
One of the top security concerns for businesses in 2014 will be Bring Your Own Device (BYOD). Lack of
employee awareness regarding social engineering attacks was the number-one concern in 2013, but this
moved to joint second place for 2014, with BYOD taking the top slot. BYOD has been such an ongoing
topic that Tech Pro Research has created a ready-made BYOD policy that companies can download to use
as their own policy.
11
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
The report also addresses the following IT security topics:
•
Employee awareness challenges
•
Improved risk management leads
•
Managing internal threats
•
Moving to risk management
•
BYOD challenges u
12
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
PwC: Software at the forefront of tech
M&A activity in 2014
By Rachel King
This might seem rather obvious following Facebook’s astounding and ginormous acquisition of WhatsApp
on Wednesday, but mergers and acquisitions in the tech world are poised to stay strong this year.
That’s the major takeaway from the latest recap and forecast from PricewaterhouseCoopers, which published
both its US Technology Deals Insights 2013 Year in Review and 2014 Outlook reports on Thursday.
Following some missteps and disappointments in 2011 and 2012, analysts from the global consulting firm
repeatedly predicted better things throughout 2013 as far as both tech M&A and IPO activity were concerned.
PwC was right for the most part, although the Deal Insights report noted that the cumulative technology
deal value for 2013 closed at $99.8 billion, down three percent from 2012.
Nevertheless, PwC pointed toward “an abundance of cash reserves from technology majors and record
levels of private equity capital” at the end of the year, which they believe have set the stage for an uptick in
technology deals this coming year.
But where the money is going might still come as a bit of a surprise -- at least to those only paying attention
to flashy trends and big-number predictions. (See: Varying forecasts for the number of connected devices
expected to take over the world between 2017 and 2020.)
Rather than mobile and big data, which are arguably the buzzwords du jour in enterprise technology, plain
old software is still the ringleader as analysts argue that this sector will remain at the forefront of tech deals.
That’s because software, as it expands into the cloud to be delivered as a service, helps fuel and power
these other verticals.
PwC cited that software accounted for 35 percent of technology M&A volume in 2013. That pace should
continue, but expect some alterations.
PwC cited that software
For one, analysts proposed that the “lines between the
accounted for 35 percent of
means combined sub-sector deals will likely decline.
technology M&A volume in 2013.
Software and Internet sectors continue to fade,” which
However, software is getting a boost as hardware M&A
activity looks mixed.
To fill in the gaps (such as infusing intelligence and automation into more critical processes), PwC
concluded that there will be “more software acquisitions that enable users to orchestrate traditional
hardware tasks with software.” u
13
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
7 things to think about with enterprise
mobile service architecture
By Joe McKendrick
In a recent article posted in Service Technology, Drs. Longji Tang of Hunan University, and Wei-Tek Tsai of
Arizona State University propose “Enterprise Mobile Service Architecture (EMSA),” which they describe as a
new enterprise architectural approach for mobile system integration.
“EMSA is a hybrid architectural style composed of enterprise mobile computing, enterprise SOA, as well
as enterprise cloud service architecture,” Tang and Tsai state. The greatest distinction from a traditional
architecture supporting PC-based clients is that the success of mobile depends on the vendors providing
the backbone services.
Here are the seven key “views” that comprise a well-functioning EMSA:
Enterprise Mobile Service: This comes from the provider side. The manufacturers of mobile devices
often provide built-in services, such as native SMS service, email service, mobile web services, and cloud
services, the authors point out.
Enterprise Mobile Service Consumer: This is the application, not the user. Enterprise mobile service
consumer can be defined as any mobile application or user interface that is provisioned in the mobile
devices, and that can access and consume enterprise mobile services.
Enterprise Mobile Service Data and Mobile Context: Mobile computing is different from traditional
distributed computing in that data and the context of data is constantly changing, versus working from a
stationary PC. “The ‘mobile context’ is a dynamic data set,” influenced by users’ tendency to roam, thereby
quickly passing from one environment to another. “Context-awareness is defined as a service capacity with
full awareness of current service execution environment that includes location, time, and user information.”
Enterprise Mobile Service Process: The role of the device in completing business processes. The
EMSP is an extension of the general enterprise service process (ESP), “a set of composed and managed
services for completing a complex business process, such as online shopping or shipping workflow, or any
business transaction process.”
Enterprise Mobile Service Infrastructure: The EMSI is an extension of SOA infrastructure. Tang and
Tsai state. However, the performance and reliability of mobile clients are dependent on the backbones of
mobile network providers.
14
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
Enterprise Mobile Service Management: While following general SOA management principles,
EMSM also addresses specific aspects and principles “based on mobile constraints, specifically on
mobility, real-time, and highly dynamic behaviors.” Such constraints include the fragmentation seen
across the mobile space in terms of form factors, operating systems and browsers -- as well as the
routing of Web content through operator networks.
Enterprise Mobile Service Quality Attributes: These track closely to enterprise SOA quality
attributes, including performance, reliability, scalability, reusability, maintainability, security, cost, and
interoperability. u
15
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
FIVE TAKEAWAYS
Five points you should take away from this reference guide:
1. Be Excited: BYOD is quickly becoming the norm. Your services will be needed more in the
coming year than they were in previous years. Get your team up-to-speed and be prepared to
deliver your services to more organizations, to more employees, on many more devices.
2. Be Safe: Organizations are more cognizant of security concerns than they’ve ever been. When
they come to you for your expertise, they’re going to want you to lead them toward a more secure
mobile ecosystem. Do what it takes to guarantee their data doesn’t end up in the wrong hands.
3. Be Diverse: Your clients will view their mobile architecture through many different lenses, from
the applications they run, to the data they’re able to collect, to the infrastructure the systems are
built on. It’s your job to ensure that all of these variables interconnect seamlessly. Do what it takes
to provide one cohesive management solution.
4. Be Nimble: Over the past five years, we’ve seen how much the mobile landscape has changed.
In the next five years, mobile adoption and functionality will look radically different than it does
today. You must stay ahead of these trends and guarantee the same level of MDM expertise
regardless of where the technology takes the industry.
5. Be Innovative: The organizations that dictate the pace and adoption of new MDM technologies
will be the first stop for businesses looking to advance their mobile strategies. Make sure
that you’re striving to achieve new advancements, rather than simply catching up to current
technology. You may stumble along the way, but your successes will overshadow your failures. u
16
Copyright ©2014 CBS Interactive Inc. All rights reserved.
MDM Technology: How to Create the Perfect Solution
About ZDNet
ZDNet (www.zdnet.com) is where technology means business. The site attracts an
enthusiastic and interactive audience of business technology influencers, many of
whom visit for the latest coverage and analysis of how technology impacts business.
Business leaders and decision makers including CEOs, CIOs and IT professionals
at all levels value the site due to its extensive resources, enabling them to make the
most out of technology for their business challenges.
About Skyhook
Skyhook is the big data company that is continuously reinventing location. With
more than a billion geo-located Wi-Fi access points, 7 billion+ monthly location
requests, 10s of millions of devices, 2.5 million geofencable points of interest, 1
billion+ geolocated IP addresses and 30 million+ cell towers, Skyhook technology
enables businesses to gain unprecedented levels of insight to optimize mobile
experiences, provide the right content when it’s needed and certify that someone
is where they say they are. For MDM providers, Skyhook’s SDK ports easily to any
operating system or platform on all smartphones, tablets, and laptops, allowing for
better UX, new revenue models and improved app integration. Learn more about
how Skyhook serves MDM and MAM providers.
17
Copyright ©2014 CBS Interactive Inc. All rights reserved.